258 lines
9.3 KiB
C++
258 lines
9.3 KiB
C++
|
/*
|
||
|
* Copyright 2016 The Android Open Source Project
|
||
|
*
|
||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||
|
* you may not use this file except in compliance with the License.
|
||
|
* You may obtain a copy of the License at
|
||
|
*
|
||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||
|
*
|
||
|
* Unless required by applicable law or agreed to in writing, software
|
||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||
|
* See the License for the specific language governing permissions and
|
||
|
* limitations under the License.
|
||
|
*
|
||
|
* sock_diag_test.cpp - unit tests for SockDiag.cpp
|
||
|
*/
|
||
|
|
||
|
#include <arpa/inet.h>
|
||
|
#include <netinet/in.h>
|
||
|
#include <linux/inet_diag.h>
|
||
|
|
||
|
#include <gtest/gtest.h>
|
||
|
|
||
|
#include "NetdConstants.h"
|
||
|
#include "SockDiag.h"
|
||
|
|
||
|
|
||
|
#define NUM_SOCKETS 500
|
||
|
|
||
|
|
||
|
class SockDiagTest : public ::testing::Test {
|
||
|
};
|
||
|
|
||
|
uint16_t bindAndListen(int s) {
|
||
|
for (int i = 0; i < 10; i++) {
|
||
|
uint16_t port = 1024 + arc4random_uniform(0xffff - 1024);
|
||
|
sockaddr_in6 sin6 = { .sin6_family = AF_INET6, .sin6_port = htons(port) };
|
||
|
if (bind(s, (sockaddr *) &sin6, sizeof(sin6)) == 0) {
|
||
|
listen(s, 1);
|
||
|
return port;
|
||
|
}
|
||
|
}
|
||
|
close(s);
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
const char *tcpStateName(uint8_t state) {
|
||
|
static const char *states[] = {
|
||
|
"???",
|
||
|
"TCP_ESTABLISHED",
|
||
|
"TCP_SYN_SENT",
|
||
|
"TCP_SYN_RECV",
|
||
|
"TCP_FIN_WAIT1",
|
||
|
"TCP_FIN_WAIT2",
|
||
|
"TCP_TIME_WAIT",
|
||
|
"TCP_CLOSE",
|
||
|
"TCP_CLOSE_WAIT",
|
||
|
"TCP_LAST_ACK",
|
||
|
"TCP_LISTEN",
|
||
|
"TCP_CLOSING",
|
||
|
"TCP_NEW_SYN_RECV",
|
||
|
};
|
||
|
return states[(state < ARRAY_SIZE(states)) ? state : 0];
|
||
|
}
|
||
|
|
||
|
TEST_F(SockDiagTest, TestDump) {
|
||
|
int v4socket = socket(AF_INET, SOCK_STREAM, 0);
|
||
|
int v6socket = socket(AF_INET6, SOCK_STREAM, 0);
|
||
|
int listensocket = socket(AF_INET6, SOCK_STREAM, 0);
|
||
|
ASSERT_NE(-1, v4socket) << "Failed to open IPv4 socket";
|
||
|
ASSERT_NE(-1, v6socket) << "Failed to open IPv6 socket";
|
||
|
ASSERT_NE(-1, listensocket) << "Failed to open listen socket";
|
||
|
|
||
|
uint16_t port = bindAndListen(listensocket);
|
||
|
ASSERT_NE(0, port) << "Can't bind to server port";
|
||
|
|
||
|
// Connect to loopback.
|
||
|
sockaddr_in server4 = { .sin_family = AF_INET, .sin_port = htons(port) };
|
||
|
sockaddr_in6 server6 = { .sin6_family = AF_INET6, .sin6_port = htons(port) };
|
||
|
ASSERT_EQ(0, connect(v4socket, (sockaddr *) &server4, sizeof(server4)))
|
||
|
<< "IPv4 connect failed: " << strerror(errno);
|
||
|
ASSERT_EQ(0, connect(v6socket, (sockaddr *) &server6, sizeof(server6)))
|
||
|
<< "IPv6 connect failed: " << strerror(errno);
|
||
|
|
||
|
sockaddr_in6 client46, client6;
|
||
|
socklen_t clientlen = std::max(sizeof(client46), sizeof(client6));
|
||
|
int accepted4 = accept(listensocket, (sockaddr *) &client46, &clientlen);
|
||
|
int accepted6 = accept(listensocket, (sockaddr *) &client6, &clientlen);
|
||
|
ASSERT_NE(-1, accepted4);
|
||
|
ASSERT_NE(-1, accepted6);
|
||
|
|
||
|
int v4SocketsSeen = 0;
|
||
|
bool seenclient46 = false;
|
||
|
bool seenNull = false;
|
||
|
char src[INET6_ADDRSTRLEN], dst[INET6_ADDRSTRLEN];
|
||
|
|
||
|
fprintf(stderr, "Ports:\n server=%d. client46=%d, client6=%d\n",
|
||
|
port, ntohs(client46.sin6_port), ntohs(client6.sin6_port));
|
||
|
|
||
|
auto checkIPv4Dump = [&] (uint8_t /* proto */, const inet_diag_msg *msg) {
|
||
|
if (msg == nullptr) {
|
||
|
EXPECT_FALSE(seenNull);
|
||
|
seenNull = true;
|
||
|
return 0;
|
||
|
}
|
||
|
EXPECT_EQ(htonl(INADDR_LOOPBACK), msg->id.idiag_src[0]);
|
||
|
v4SocketsSeen++;
|
||
|
seenclient46 |= (msg->id.idiag_sport == client46.sin6_port);
|
||
|
inet_ntop(AF_INET, msg->id.idiag_src, src, sizeof(src));
|
||
|
inet_ntop(AF_INET, msg->id.idiag_src, dst, sizeof(dst));
|
||
|
fprintf(stderr, " v4 %s:%d -> %s:%d %s\n",
|
||
|
src, htons(msg->id.idiag_sport),
|
||
|
dst, htons(msg->id.idiag_dport),
|
||
|
tcpStateName(msg->idiag_state));
|
||
|
return 0;
|
||
|
};
|
||
|
|
||
|
int v6SocketsSeen = 0;
|
||
|
bool seenClient6 = false, seenServer46 = false, seenServer6 = false;
|
||
|
|
||
|
auto checkIPv6Dump = [&] (uint8_t /* proto */, const inet_diag_msg *msg) {
|
||
|
if (msg == nullptr) {
|
||
|
EXPECT_FALSE(seenNull);
|
||
|
seenNull = true;
|
||
|
return 0;
|
||
|
}
|
||
|
struct in6_addr *saddr = (struct in6_addr *) msg->id.idiag_src;
|
||
|
EXPECT_TRUE(
|
||
|
IN6_IS_ADDR_LOOPBACK(saddr) ||
|
||
|
(IN6_IS_ADDR_V4MAPPED(saddr) && saddr->s6_addr32[3] == htonl(INADDR_LOOPBACK)));
|
||
|
v6SocketsSeen++;
|
||
|
seenClient6 |= (msg->id.idiag_sport == client6.sin6_port);
|
||
|
seenServer46 |= (msg->id.idiag_sport == htons(port));
|
||
|
seenServer6 |= (msg->id.idiag_sport == htons(port));
|
||
|
inet_ntop(AF_INET6, msg->id.idiag_src, src, sizeof(src));
|
||
|
inet_ntop(AF_INET6, msg->id.idiag_src, dst, sizeof(dst));
|
||
|
fprintf(stderr, " v6 [%s]:%d -> [%s]:%d %s\n",
|
||
|
src, htons(msg->id.idiag_sport),
|
||
|
dst, htons(msg->id.idiag_dport),
|
||
|
tcpStateName(msg->idiag_state));
|
||
|
return 0;
|
||
|
};
|
||
|
|
||
|
SockDiag sd;
|
||
|
ASSERT_TRUE(sd.open()) << "Failed to open SOCK_DIAG socket";
|
||
|
|
||
|
seenNull = false;
|
||
|
int ret = sd.sendDumpRequest(IPPROTO_TCP, AF_INET, "127.0.0.1");
|
||
|
ASSERT_EQ(0, ret) << "Failed to send IPv4 dump request: " << strerror(-ret);
|
||
|
fprintf(stderr, "Sent IPv4 dump\n");
|
||
|
sd.readDiagMsg(IPPROTO_TCP, checkIPv4Dump);
|
||
|
EXPECT_GE(v4SocketsSeen, 1);
|
||
|
EXPECT_TRUE(seenclient46);
|
||
|
EXPECT_FALSE(seenServer46);
|
||
|
|
||
|
seenNull = false;
|
||
|
ret = sd.sendDumpRequest(IPPROTO_TCP, AF_INET6, "127.0.0.1");
|
||
|
ASSERT_EQ(0, ret) << "Failed to send mapped dump request: " << strerror(-ret);
|
||
|
fprintf(stderr, "Sent mapped dump\n");
|
||
|
sd.readDiagMsg(IPPROTO_TCP, checkIPv6Dump);
|
||
|
EXPECT_TRUE(seenServer46);
|
||
|
|
||
|
seenNull = false;
|
||
|
ret = sd.sendDumpRequest(IPPROTO_TCP, AF_INET6, "::1");
|
||
|
ASSERT_EQ(0, ret) << "Failed to send IPv6 dump request: " << strerror(-ret);
|
||
|
fprintf(stderr, "Sent IPv6 dump\n");
|
||
|
|
||
|
sd.readDiagMsg(IPPROTO_TCP, checkIPv6Dump);
|
||
|
EXPECT_GE(v6SocketsSeen, 1);
|
||
|
EXPECT_TRUE(seenClient6);
|
||
|
EXPECT_TRUE(seenServer6);
|
||
|
|
||
|
close(v4socket);
|
||
|
close(v6socket);
|
||
|
close(listensocket);
|
||
|
close(accepted4);
|
||
|
close(accepted6);
|
||
|
}
|
||
|
|
||
|
TEST_F(SockDiagTest, TestMicroBenchmark) {
|
||
|
fprintf(stderr, "Benchmarking closing %d sockets\n", NUM_SOCKETS);
|
||
|
|
||
|
int listensocket = socket(AF_INET6, SOCK_STREAM, 0);
|
||
|
ASSERT_NE(-1, listensocket) << "Failed to open listen socket";
|
||
|
|
||
|
uint16_t port = bindAndListen(listensocket);
|
||
|
ASSERT_NE(0, port) << "Can't bind to server port";
|
||
|
sockaddr_in6 server = { .sin6_family = AF_INET6, .sin6_port = htons(port) };
|
||
|
|
||
|
using ms = std::chrono::duration<float, std::ratio<1, 1000>>;
|
||
|
|
||
|
int clientsockets[NUM_SOCKETS], serversockets[NUM_SOCKETS];
|
||
|
uint16_t clientports[NUM_SOCKETS];
|
||
|
sockaddr_in6 client;
|
||
|
socklen_t clientlen;
|
||
|
|
||
|
auto start = std::chrono::steady_clock::now();
|
||
|
for (int i = 0; i < NUM_SOCKETS; i++) {
|
||
|
int s = socket(AF_INET6, SOCK_STREAM, 0);
|
||
|
clientlen = sizeof(client);
|
||
|
ASSERT_EQ(0, connect(s, (sockaddr *) &server, sizeof(server)))
|
||
|
<< "Connecting socket " << i << " failed " << strerror(errno);
|
||
|
serversockets[i] = accept(listensocket, (sockaddr *) &client, &clientlen);
|
||
|
ASSERT_NE(-1, serversockets[i])
|
||
|
<< "Accepting socket " << i << " failed " << strerror(errno);
|
||
|
clientports[i] = client.sin6_port;
|
||
|
clientsockets[i] = s;
|
||
|
}
|
||
|
fprintf(stderr, " Connecting: %6.1f ms\n",
|
||
|
std::chrono::duration_cast<ms>(std::chrono::steady_clock::now() - start).count());
|
||
|
|
||
|
SockDiag sd;
|
||
|
ASSERT_TRUE(sd.open()) << "Failed to open SOCK_DIAG socket";
|
||
|
|
||
|
start = std::chrono::steady_clock::now();
|
||
|
int ret = sd.destroySockets("::1");
|
||
|
EXPECT_LE(0, ret) << ": Failed to destroy sockets on ::1: " << strerror(-ret);
|
||
|
fprintf(stderr, " Destroying: %6.1f ms\n",
|
||
|
std::chrono::duration_cast<ms>(std::chrono::steady_clock::now() - start).count());
|
||
|
|
||
|
int err;
|
||
|
start = std::chrono::steady_clock::now();
|
||
|
for (int i = 0; i < NUM_SOCKETS; i++) {
|
||
|
ret = send(clientsockets[i], "foo", sizeof("foo"), 0);
|
||
|
err = errno;
|
||
|
EXPECT_EQ(-1, ret) << "Client socket " << i << " not closed";
|
||
|
if (ret == -1) {
|
||
|
// Since we're connected to ourselves, the error might be ECONNABORTED (if we destroyed
|
||
|
// the socket) or ECONNRESET (if the other end was destroyed and sent a RST).
|
||
|
EXPECT_TRUE(errno == ECONNABORTED || errno == ECONNRESET)
|
||
|
<< "Client socket: unexpected error: " << strerror(errno);
|
||
|
}
|
||
|
|
||
|
ret = send(serversockets[i], "foo", sizeof("foo"), 0);
|
||
|
err = errno;
|
||
|
EXPECT_EQ(-1, ret) << "Server socket " << i << " not closed";
|
||
|
if (ret == -1) {
|
||
|
EXPECT_TRUE(errno == ECONNABORTED || errno == ECONNRESET)
|
||
|
<< "Server socket: unexpected error: " << strerror(errno);
|
||
|
}
|
||
|
}
|
||
|
fprintf(stderr, " Verifying: %6.1f ms\n",
|
||
|
std::chrono::duration_cast<ms>(std::chrono::steady_clock::now() - start).count());
|
||
|
|
||
|
|
||
|
|
||
|
start = std::chrono::steady_clock::now();
|
||
|
for (int i = 0; i < NUM_SOCKETS; i++) {
|
||
|
close(clientsockets[i]);
|
||
|
close(serversockets[i]);
|
||
|
}
|
||
|
fprintf(stderr, " Closing: %6.1f ms\n",
|
||
|
std::chrono::duration_cast<ms>(std::chrono::steady_clock::now() - start).count());
|
||
|
|
||
|
close(listensocket);
|
||
|
}
|